• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Endesa Data Breach

    Spanish Energy Giant Endesa Notifies Customers of Data Breach Impacting Energía XXI

    Credit: Franz Bachinger/Pixabay

    Attackers Targeting LLMs in Widespread Campaign

    TCE-Exclusive-interview-with-Dr-Amit-Chaubey

    Inside the 2026 Business Blast Radius: Dr. Amit Chaubey on Why Cyber Disruption Is Now a Sovereign Risk

    Internet Blackout, Iran, Trump, Civil Unrest, Internet Shutdown

    84 Hrs and Counting as Internet Blackout in Iran Continues Amid Nationwide Unrest

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Kyowon Group cyberattack

    Kyowon Group Confirms Cyberattack as Multiple Systems Go Offline

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Canopy Health data breach

    Canopy Health Confirms Cyberattack, Patients Not Notified for Six Months

    North Korean Kimsuky Threat Actors Use Malicious QR Codes and Quishing to Target Foreign Policy Experts

    North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Endesa Data Breach

    Spanish Energy Giant Endesa Notifies Customers of Data Breach Impacting Energía XXI

    Credit: Franz Bachinger/Pixabay

    Attackers Targeting LLMs in Widespread Campaign

    TCE-Exclusive-interview-with-Dr-Amit-Chaubey

    Inside the 2026 Business Blast Radius: Dr. Amit Chaubey on Why Cyber Disruption Is Now a Sovereign Risk

    Internet Blackout, Iran, Trump, Civil Unrest, Internet Shutdown

    84 Hrs and Counting as Internet Blackout in Iran Continues Amid Nationwide Unrest

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Kyowon Group cyberattack

    Kyowon Group Confirms Cyberattack as Multiple Systems Go Offline

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Canopy Health data breach

    Canopy Health Confirms Cyberattack, Patients Not Notified for Six Months

    North Korean Kimsuky Threat Actors Use Malicious QR Codes and Quishing to Target Foreign Policy Experts

    North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Does Scambaiting Actually Deter Scammers?

Scambaiting is a tactic to keep scammers engaged as long as possible to prevent them from targeting others.

thecyberexpress by thecyberexpress
July 4, 2023
in Features
0
Scambaiting
695
SHARES
3.9k
VIEWS
Share on LinkedInShare on Twitter

by Zac Amos

Cybercrime has drastically increased in recent years, heavily impacting vulnerable people and organizations. In response, digital vigilantes took up scambaiting to get revenge on scammers.

While it may be a solution to an inadequate system, some argue it has little genuine effect. Does it actually deter anyone?

What Is Scambaiting?

Some experts project global annual cybercrime costs to reach $10.5 trillion by 2025, up from $3 trillion in 2015. It’s an ever-growing issue that needs attention.

Since individuals are most often a target, many responded by scambaiting. It originated as a response to excessive scam emails and calls but has grown in popularity as fraud becomes more rampant.

Basically, scambaiting is a tactic to keep scammers engaged as long as possible to prevent them from targeting others. It usually involves deception or social engineering methods on the scambaiter’s part.

report-ad-banner

They intentionally waste time and typically stall as much as possible. Many upload their interactions to the internet afterwards.

How Does Scambaiting Work?

Essentially, scambaiters are digital vigilantes that seek revenge on scammers. Some seek out fraud, while others only react after contact. Since fraud affects almost 4.6 million people annually, they typically don’t have to wait long.

Once they are speaking with a scammer, the scambaiters typically disguise themselves as naive and vulnerable. They pretend to genuinely believe whatever claims they are fed to prolong engagement. Since they are not actually interested, the interactions end up wasting the fraudster’s time and frustrating them.

For example, a scambaiter who receives an illegitimate email will respond and pretend to be oblivious to the fraud. They follow all of the scammer’s orders up to the point where they’d send money. Then, they either pretend to be incompetent to further stall or reveal their deception.

It encompasses all types of scams, so scambaiters are sometimes in contact for days or weeks before revealing themselves.

Many trick scammers into performing humiliating actions or revealing personal information. Some take it further and attempt to disrupt the fraud operation, whether through damaging their computers or publicizing their location.

Is Scambaiting Necessary?

According to the United Kingdom National Fraud Intelligence Bureau, COVID-related cybercrime reached $34.5 million in losses as of 2021. As long as digital fraud continues to increase, some form of scam prevention will be necessary.

While individuals using scambaiting may not be the best suited for the position, they are often the only ones who take action. Many legal and regulatory bodies don’t take scams seriously because they can be challenging to investigate.

As technology advances, so do scammer tactics.

For instance, they can create fake content with generative artificial intelligence in a few short minutes — and it’s more realistic than ever. Finding their true identity is much more challenging when they essentially produce faulty evidence of their existence — doing a reverse image search with original, unpublished content isn’t possible.

Police have struggled to pursue cybercrime because of the continuously increasing demand. They don’t have enough resources to cover all the new cases they receive, so many go unsolved.

Digital vigilantes potentially prevent more people from becoming victims of fraud. Their efforts may not have an incredibly significant impact, but collective action can help.

In addition, scambaiters often make up for the state’s insufficiencies. For example, Birmingham City University labeled the U.K.’s national fraud hotline as unfit for purpose in 2020 after investigations uncovered consistent inaction.

One discovered that it successfully pursued only one in 50 fraud cases and simply abandoned the others. Scambaiting may not be an ideal response, but it’s often the only solution available to most.

What Motivates Scambaiters?

Most internet vigilantes engage in scambaiting because they want retribution or feel a sense of justice. Most often, they seek to cause frustration and disorder — whatever will cause a significant impact.

Scambaiters have four primary motivators:

  • Raise awareness: People exposed to videos or descriptions of scambaiting are more likely to recognize fraud.
  • Deter scammers: Some take steps to damage a scammer’s resources or reputation, deterring them from future fraud attempts.
  • Prevent scams: Keeping a scammer occupied with a call that will go nowhere can protect others from being scammed. As long as they’re busy, they can’t cause actual harm.
  • Disrupt operations: Many attempt to cause significant damage or distress to have more long-term disruptions in the fraud operation.

Most scambaiters share these motivators. While they generally have good intentions and get positive results, some are more malicious. It’s an unregulated practice, so they have no set standards.

What Are the Disadvantages of Scambaiting?

While scambaiting can be a much faster alternative to regulated activities, it does come with potential disadvantages.

The 419eaters forum is a good example. It’s the self-described biggest scambaiting group in the world, with more than 1.7 million threads as of 2021.

Although its members put consistent effort into fraud disruption and prevention, their intent is sometimes misaligned.

Their system rewards certain activities. For example, the pith helmet award goes to people who can get their target to travel more than 200 miles in one trip.

They also often convince scammers to send nude graphic images because they can then post them online. Their goal is public humiliation.

The reward system incentivizes users to cause disproportional mental or physical strain. Many assume the fraudster’s malicious intentions justify this behavior, but does one immoral action justify another? A large, unregulated collective acting in such a capacity can potentially be dangerous.

What Are Potential Scambaiting Dangers?

Scambaiting can pose risks to the scambaiter as well as the fraudster. The people behind the deception are already willing to steal the life savings of vulnerable people, so there’s potential for more significant adverse reactions.

There are a few potential scambaiting dangers:

  • Disproportionate responses: Many people are driven by anger when scambaiting, which increases the likelihood of taking things too far. While some may feel their actions are just, they may only be seeking harm to get revenge on scammers.
  • Legal consequences: Many people want to give scammers a taste of their own medicine, but the law doesn’t protect their actions. Doing something illegal in pursuit of catching a scammer is still illegal.
  • Increased scam attempts: Scammers will continue to contact someone if they initially answer. Also, they will often bombard scambaiters with messages and calls in retribution.
  • Accidental information disclosure: Scambaiters can accidentally expose their personal information — like their IP address — while interacting with a scammer, which can open them up to a potentially dangerous response from the scammer.

People who seek revenge on scammers should be aware of potential scambaiting dangers to protect themselves. While retribution may be as minor as constant phone calls, it can quickly escalate.

Does Scambaiting Deter Scammers?

Although scambaiting has disadvantages and possible dangers, it’s a relatively common response to increased fraud levels. Scammers are targeting individuals at an unprecedented rate. Regulatory and legal bodies can’t handle their workloads and are resorting to case abandonment. Digital vigilantes may possess questionable motives and methods at times, but they offer many more options than the current system.

Applying standards to scambaiting could help ensure more legitimate and ethical practices. A cybercrime professor from the University of New South Wales believes more regulation and stricter payment barriers could reduce half of all scams at minimum.

However, given the scale that scammers operate at, scambaiters may not have the impact they hope for. Even if they succeed in deterring one scammer, that will likely not translate to deterring the scammer’s entire network. But while scambaiters may not make much of a dent in overall scamming activities, they are improving awareness.

Scambaiter content creators have risen in popularity in recent years, providing viewers with inside details on how scams work and bringing scam awareness into the public consciousness.

Scambaiting may not be the perfect solution, but it can still be a valid tactic in a system of inaction. More collective action in the future may genuinely deter scammers from defrauding vulnerable people, and the rise of scambaiters as content creators should help more people avoid being scammed themselves.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Scambaiting
Previous Post

What’s the Problem With Backdoor Encryption?

Next Post

AFP Cyber Attack: Anonymous Sudan Strikes Multiple Media Companies

Next Post
AFP Cyber Attack 3

AFP Cyber Attack: Anonymous Sudan Strikes Multiple Media Companies

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Endesa Data Breach
Cyber News

Spanish Energy Giant Endesa Notifies Customers of Data Breach Impacting Energía XXI

January 13, 2026
Credit: Franz Bachinger/Pixabay
Cyber News

Attackers Targeting LLMs in Widespread Campaign

January 12, 2026
TCE-Exclusive-interview-with-Dr-Amit-Chaubey
Cyber News

Inside the 2026 Business Blast Radius: Dr. Amit Chaubey on Why Cyber Disruption Is Now a Sovereign Risk

January 13, 2026
Internet Blackout, Iran, Trump, Civil Unrest, Internet Shutdown
Cyber News

84 Hrs and Counting as Internet Blackout in Iran Continues Amid Nationwide Unrest

January 12, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information